Author of the publication

Anti-Honeypot Enabled Optimal Attack Strategy for Industrial Cyber-Physical Systems.

, , , , , and . IEEE Open J. Comput. Soc., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Dempster-Shafer Evidence Theory and Choquet Integral for Image Segmentation in Gas-Liquid Two-Phase Flow., , , and . Int. J. Distributed Sens. Networks, 5 (1): 53 (2009)Defending Byzantine attacks in ensemble federated learning: A reputation-based phishing approach., , , , , and . Future Gener. Comput. Syst., (2023)Fitting PB1-p62 filaments model structure into its electron microscopy based on an improved genetic algorithm., , and . J. Comb. Optim., 42 (4): 937-947 (2021)MULTIPLE: Multi-level User Preference Learning for List Recommendation., , , and . WISE (2), volume 13081 of Lecture Notes in Computer Science, page 221-236. Springer, (2021)Improving Micro-video Recommendation by Controlling Position Bias., , , , , and . ECML/PKDD (1), volume 13713 of Lecture Notes in Computer Science, page 508-523. Springer, (2022)Locating False Data Injection Attacks on Smart Grids Using D-FACTS Devices., , , , and . ICSOC, volume 13121 of Lecture Notes in Computer Science, page 287-301. Springer, (2021)Dynamically optimizing face recognition using PCA., and . ICCAIS, page 123-127. IEEE, (2015)Modeling User Engagement in Mobile Content Consumption with Tapstream Data., , , and . ICIS, Association for Information Systems, (2016)Using TB-Sized Data to Understand Multi-Device Advertising., , , and . ICIS, Association for Information Systems, (2016)Empowering Patients Using Smart Mobile Health Platforms: Evidence From A Randomized Field Experiment., , , and . CoRR, (2021)